Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 22:49

General

  • Target

    5faba37531214c9720ffbc2692704a54008fe56a777094522637c7ebf0f06aaf.exe

  • Size

    56KB

  • MD5

    530c9ce05a6b43114032bae2546d6532

  • SHA1

    a3fa6e29a61da4a322b54f38f0ee803506b04a9c

  • SHA256

    5faba37531214c9720ffbc2692704a54008fe56a777094522637c7ebf0f06aaf

  • SHA512

    f796e829ee09667ac2d3d9d6e9734ef0572283b598a299d300870bb521adc805f701d9c56d3d48fa5e316100e0b30f31a9fa7a638ca0baf1be07f9236bf31e87

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw1VyjVyfxAkJhxAkJl5H5IMs4MsI:W7ZppApyVyjVyv5H5a

Score
9/10

Malware Config

Signatures

  • Renames multiple (3588) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5faba37531214c9720ffbc2692704a54008fe56a777094522637c7ebf0f06aaf.exe
    "C:\Users\Admin\AppData\Local\Temp\5faba37531214c9720ffbc2692704a54008fe56a777094522637c7ebf0f06aaf.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    61ee5a6da665e811808d8a63b453259d

    SHA1

    97bad529aa37c9baba4a55550a09a9aa2a8a8efc

    SHA256

    78671ea8fc1226560183b47fc9a180642487a87000198f5fdc78c59de0399e99

    SHA512

    bd98ca71f41780890c0418eeefc58368a894495aecda8fe585ed0d82711883b0a292bed619ca9ffe06c42c3db215ca5a474ab1e4616bc7456c099f0fe294d78b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    e35b67af8e5da342fa0eeced0a04f99c

    SHA1

    0d69cacf6493cd0d30c75db4a08115019bee2ef9

    SHA256

    91f1462698b2789a14fe63b77a0bb8902e06b835e5e107361c742ea57b4516a5

    SHA512

    687fdd0766d569666c9a50f8ca1be6f56b51385355a0746fd82cd47d43203c5374e24d58a3af13a596fbd9f6c49cbcf8d473a1fae7b196ebf417dcb3567f1f90